Latest News from quorum cyber

Cyber-criminals are outspending businesses by a factor of more than ten to one, according to new data supplied by the World Economic Forum (WEF) and the Centre for Strategic and International Studies (CSIS). The two international watchdogs estimate that hackers are investing as much as $1 trillion (£768.5 billion) in finding new ways to breach online defences.

The first port of call when improving any existing security infrastructure is assessing its current state of proficiency. Recognising areas where the status quo is working well will allow you to devote the requisite time and resources to patching up areas where it isn’t.

With more and more of our interactions and transactions now taking place online, it’s no surprise that cyber-crime is growing by the day. Opportunistic hackers will seek any opportunity to infiltrate your company’s network and access its sensitive information – and the methods employed to do so are evolving and adapting all the time.

As awareness of the risks surrounding cyber-crime increases, many businesses are waking up to the urgent need to protect themselves online from malicious attackers. Enhanced employee training programmes and increased investment in software solutions can go some way to mitigating this threat, but without any way of quantifying your progress, it’s impossible to know how well your business’ online defences are holding up in the face of an ever-shifting threat landscape.

In this project, we were tasked with on-boarding a new customer to our Cyber Security Operations Centre (C-SOC). This would be “just another SOC paper” if it wasn’t for the fact that this particular Customer has an architecture that is exactly what we built the C-SOC for: they are almost exclusively an Azure Platform as a Service (PaaS) operation.

The server as we know it is a dying breed. With the advent of Amazon Web Services (AWS) Lambda in November 2015, and the raft of similar function-as-a-service (FaaS) platforms which followed it, more and more companies are choosing to migrate into the serverless world.

After all, the advantages in scalability, simplicity, and cost-effectiveness are enough to make the head spin and the heart sing – but what does the move mean for security?